TTP SmartCard-Based ElGamal Cryptosystem Using Threshold Scheme for Electronic Elections

نویسندگان

  • Jordi Pujol Ahulló
  • Roger Jardí-Cedó
  • Jordi Castellà-Roca
  • Oriol Farràs
چکیده

The private key of electronic elections is a very critical piece of information that, with an incorrect or improper use, may disrupt the elections results. To enforce the privacy and security of the private key, secret sharing schemes (or threshold schemes) are used to generate a distributed key into several entities. In this fashion, a threshold of at least t out of the n entities will be necessary to decrypt votes. We study in this work the feasibility of developing ElGamal cryptosystem and Shamir’s secret sharing scheme into JavaCards, whose API gives no support for it.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Multi-authority Electronic Voting Scheme Based on Elliptic Curves

In this paper, a new multi authority electronic voting scheme based on elliptic curves is proposed. According to the proposed scheme, each voter casts the vote as a point on the elliptic curve and the final tally is computed with the assistance of multiple authorities. A trusted center is involved in the scheme to distribute the shared secret key among the authorities and the Shamir (t, n) thre...

متن کامل

Analysis, Improvement, and Simplification of Prêt à Voter with Paillier Encryption

In this paper, we analyse information leakage in Ryan’s Prêt à Voter with Paillier encryption scheme (PAVPaillier). Our analysis shows that although PAV-Paillier seems to achieve a high level of voter privacy at first glance, it might still leak voter’s choice information in some circumstances. Some threats are trivial and have appeared in the literature, but others are more complicated because...

متن کامل

Ad-Hoc Threshold Broadcast Encryption with Shorter Ciphertexts

In a threshold broadcast encryption scheme, a sender chooses (ad-hoc) a set of n receivers and a threshold t, and then encrypts a message by using the public keys of all the receivers, in such a way that the original plaintext can be recovered only if at least t receivers cooperate. This kind of scheme has many applications in mobile ad-hoc networks, characterized by their lack of infrastructur...

متن کامل

A Flexible Threshold Cryptosystem 1

| This paper presents a group-oriented (t;n) threshold cryptosystem in which the sender determines the threshold parameter t and selects the group of intended receivers. The proposed scheme is practical, eecient and non-interactive. It does not need any trusted clerks or trusted key distribution centers. The security of the scheme is equivalent to the security of the original ElGamal cryptosystem.

متن کامل

An Electronic Voting Scheme through Blind Signature

Many e-voting schemes have been proposed in the literature. However, none of them is both secure and practical. In this paper, a practical and secure electronic voting protocol for large-scale voting over the Internet is investigated. Blind signature is applied to a voter's ballot making it impossible for anyone to trace the ballot back to the voter. Unlike previous blind signature based scheme...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2011